IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems Reports
176 - 200 of 1103 Matches Previous Page  |  Next Page
6 Tips to Get Your Appsec Program Bigger and Better Than Ever
sponsored by Veracode, Inc.
WHITE PAPER: Discover 6 tips that can help you create an ongoing, comprehensive application security program and mitigate the risk of using third part app components.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

How Open Code Components Increasing Speed, But Also Risk
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to handle the risk of open source components being used in the software that your organization uses, builds, and sells.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Discover a detailed showcase of the 3 steps on the path to building up your organization's application security maturity.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

Application Security Program Checklist
sponsored by Veracode, Inc.
WHITE PAPER: Discover a step-by-step rundown of what you need to know to implement an advanced application security program successfully.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

Unmasking Subdomain Abuse: How to Protect Against These Stealth Attacks
sponsored by Farsight Security
TRANSCRIPT: Discover how cyber-criminals are increasingly using both legitimate as well as malicious subdomains to gain entry into networks and commit other cyber-crime.
Posted: 08 May 2017 | Published: 03 Feb 2017

Farsight Security

Cybersecurity: Turning Threat Data Into Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Learn how real-time DNS observations improve the accuracy and response time to cyberattacks and how to use passive DNS to escalate the discovery and accelerate the investigative timeline.
Posted: 08 May 2017 | Published: 08 May 2017

Farsight Security

Not All Machine Learning Is Created Equal
sponsored by Cylance
WHITE PAPER: Discover how to apply machine learning to your organization's endpoint security and achieve unprecedented efficacy rates, minimal consumption of system resources, exceptional attack prevention speed, and more.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

The ROI of Modern Endpoint Security
sponsored by Cylance
WHITE PAPER: In this Forrester report discover a framework to evaluate the potential financial impact and ROI of advanced endpoint security solutions.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

Navigating the NY Dep. of Financial Services' Cybersecurity Regulations
sponsored by Veracode, Inc.
WHITE PAPER: Discover the 5 minimum requirements for NYDFS compliant cybersecurity programs, and what it means that these regulations require each company to assess its specific risk profile and design a program that addresses its risks in a "robust" fashion.
Posted: 08 May 2017 | Published: 08 May 2017

Veracode, Inc.

Combating the Top 4 Sources of Vulnerabilities
sponsored by Veracode, Inc.
WHITE PAPER: Vulnerability software is leading to security breaches. Learn how to combat the top four sources of application software vulnerabilities.
Posted: 08 May 2017 | Published: 08 May 2017

Veracode, Inc.

Strengthen Your Security Posture by Mapping Network Traffic to Users
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores how to leverage a User-ID security platform with next-generation firewall capabilities. Find out how to easily integrate user information into your security infrastructure and with features like user authentication and user-based policy control and reporting.
Posted: 08 May 2017 | Published: 31 Dec 2016

Palo Alto Networks

Advanced Threat Prevention: 6 Vendors go Head to Head
sponsored by Cylance
RESEARCH CONTENT: See the results of an advanced threat prevention test of enterprise endpoint protection software where 6 competitor endpoint products – Cylance, Kaspersky, McAfee, Sophos, Symantec and Trend Micro – go head-to-head in 4 performance areas.
Posted: 05 May 2017 | Published: 02 Feb 2017

Cylance

Identifying the Timeline Activities of a Cyber Breach
sponsored by Farsight Security
CASE STUDY: In this case study discover how the use of DNSDB in mapping malicious and benign infrastructure revealed the timeline and activity of a breach of the Anthem Healthcare System.
Posted: 05 May 2017 | Published: 05 May 2017

Farsight Security

Mobile, Cloud & Desktop Security: 3 Keys to Digital Success
sponsored by MobileIron
WHITE PAPER: What's holding so many organizations back from using mobile to its full potential? Mobile, cloud, and desktop security. Access this white paper to learn how to protect your critical data on any device, network, or cloud service so you can focus on delivering business value instead of reacting to security threats and fighting fires.
Posted: 05 May 2017 | Published: 30 Dec 2016

MobileIron

SPLUNK® SOFTWARE AS A SIEM
sponsored by Splunk
WHITE PAPER: Learn a new approach to SIEM that will give your organization the ability to combat the modern threat landscape and secure its data, all from a single pane of glass.
Posted: 04 May 2017 | Published: 04 May 2017

Splunk

Secure Apps at the Speed of DevOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report explores the importance of uniting security pros with Dev and Ops to deliver on accelerated secure app development. Uncover the report's key findings to learn how to build security into earlier stages of the app lifecycle to remediate vulnerabilities without sacrificing speed.
Posted: 04 May 2017 | Published: 16 Dec 2016

Veracode, Inc.

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany it.
Posted: 03 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Security Use Case Detecting Unknown Malware
sponsored by Splunk
WHITE PAPER: Learn how to gain significant power over understanding detailed activities on endpoint as well as the ability to detect advanced and unknown malware activities.
Posted: 03 May 2017 | Published: 03 May 2017

Splunk

What Every Organization Needs to Know Before, During, and After a Ransomware Attack
sponsored by Proofpoint, Inc.
WHITE PAPER: This guide helps you defend against phishing emails, vulnerabilities in mobile devices, and infected websites. Assess your organization's ability to prevent, respond to, and remediate attacks with a ransomware survival checklist.
Posted: 02 May 2017 | Published: 02 May 2017

Proofpoint, Inc.

Mapping the Ransomware Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide to ransomware details what you must know to keep your organization safe from a costly ransomware attack.
Posted: 02 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

A Practical Process for Incident Response
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to put together a practical approach to incident response in light of today's threat landscape with a 4-step incident response process.
Posted: 01 May 2017 | Published: 01 May 2017

Proofpoint, Inc.

Expert Insight: AI, Machine Learning, and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: See the results of over 400 experts weighing in on artificial intelligence, machine learning, and non-malware attacks.
Posted: 09 May 2017 | Published: 09 May 2017

Carbon Black

Threat Hunting For Dummies
sponsored by Carbon Black
EBOOK: It's time to get proactive with threat hunting. In this Threat Hunting for Dummies e-book learn how to optimize your tools for endpoint visibility and threat intelligence and uncover 10 tips for creating effective threat hunting strategies.
Posted: 09 May 2017 | Published: 08 May 2017

Carbon Black

Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise
176 - 200 of 1103 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement